Secure Image Processing and Transmission Schema in Cluster-Based Wireless Sensor Network

WSN as a new category of computer-based computing platforms and network structures is showing new applications in different areas such as environmental monitoring, health care and military applications. Although there are a lot of secure image processing schemas designed for image transmission over a network, the limited resources and the dynamic environment make it invisible to be used with Wireless Sensor Networks (WSNs). In addition, the current secure data transmission schemas in WSN are concentrated on the text data and are not applicable for image transmission’s applications. Furthermore, secure image transmission is a big challenging issue in WSNs especially for the application that uses image as its main data such as military applications. The reason why is because the limited resources of the sensor nodes which are usually deployed in unattended environments. This chapter introduces a secure image processing and transmission schema in WSN using Elliptic Curve Cryptography (ECC) and Homomorphic Encryption (HE). Secure Image Processing and Transmission Schema in Cluster-Based Wireless Sensor Network

[1]  K. Somasundaram,et al.  A comparative study of clusterhead selection algorithms in wireless sensor networks , 2011, ArXiv.

[2]  Sanjay Kumar Madria,et al.  A secure hierarchical model for sensor network , 2004, SGMD.

[3]  Dirk Westhoff,et al.  Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[4]  Yang Li-zhen,et al.  SLEACH: Secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks , 2008, Wuhan University Journal of Natural Sciences.

[5]  Mohamed Elhoseny,et al.  A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption , 2016, J. King Saud Univ. Comput. Inf. Sci..

[6]  S. Swamynathan,et al.  Genetic-based Biometric Security System for Wireless Sensor-based Health Care Systems , 2012, 2012 International Conference on Recent Advances in Computing and Software Systems.

[7]  Ramachandran Amutha,et al.  Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms , 2013, Journal of Communications and Networks.

[8]  Meng Zhang,et al.  Energy-efficient and Secure Sensor Data Transmission Using Encompression , 2013, 2013 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems.

[9]  Dirk Westhoff,et al.  Tinypeds: Tiny Persistent Encrypted Data Storage 3 in Asynchronous Wireless Sensor Networks 4 , 2006 .

[10]  Mohamed Elhoseny,et al.  Balancing Energy Consumption in Heterogeneous Wireless Sensor Networks Using Genetic Algorithm , 2015, IEEE Communications Letters.

[11]  Gang Hu,et al.  Research and Improve on Secure Routing Protocols in Wireless Sensor Networks , 2008, 2008 4th IEEE International Conference on Circuits and Systems for Communications.

[12]  Maamoun Ahmed,et al.  Data Mining and Fusion Techniques for WSNs as a Source of the Big Data , 2015 .

[13]  Mukesh A. Zaveri,et al.  Synthesized Cluster Head Selection and Routing for Two Tier Wireless Sensor Network , 2013, J. Comput. Networks Commun..

[14]  Jaecheol Ryou,et al.  ID-based sensor node authentication for multi-layer sensor networks , 2014, Journal of Communications and Networks.

[15]  Wei Zhang,et al.  A survey on intelligent routing protocols in wireless sensor networks , 2014, J. Netw. Comput. Appl..

[16]  Li Xu,et al.  An Efficient Secure On-Demand Routing in Clustered Wireless Ad Hoc Networks , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[17]  Vallipuram Muthukkumarasamy,et al.  An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks , 2015, IEEE Sensors Journal.

[18]  Aboul Ella Hassanien,et al.  An Overview of Self-Protection and Self-Healing in Wireless Sensor Networks , 2014, Bio-inspiring Cyber Security and Cloud Services.

[19]  Ricardo Dahab,et al.  SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..

[20]  Qiang Zhou,et al.  A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks , 2014, Sensors.

[21]  Ankit Thakkar,et al.  Cluster Head Election for Energy and Delay Constraint Applications of Wireless Sensor Network , 2014, IEEE Sensors Journal.

[22]  Mohsen Guizani,et al.  Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[23]  Xiaohui Yuan,et al.  Extending self-organizing network availability using genetic algorithm , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[24]  Ebin Deni Raj An Efficient Cluster Head Selection Algorithm for Wireless Sensor Networks -Edrleach , 2012 .

[25]  Xiaohui Yuan,et al.  An energy efficient encryption method for secure dynamic WSN , 2016, Secur. Commun. Networks.

[26]  Abbas Karimi,et al.  Cluster head selection using fuzzy logic and chaotic based genetic algorithm in wireless sensor network , 2013 .

[27]  Bechir Hamdaoui,et al.  Design and Analysis of Delay-Tolerant Sensor Networks for Monitoring and Tracking Free-Roaming Animals , 2012, IEEE Transactions on Wireless Communications.

[28]  Souheila Bouam,et al.  Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks , 2013, Int. J. Commun. Networks Inf. Secur..